Results

Paper Avail. Funct. Repro. Available At
"Your imaging may be stone-cold normal, but if they look sick, they’re going to get admitted": An Investigation of Clinicians’ Perceptions of Impact & Likelihood of Security Failures Artifacts Available (v1.1) πŸ“¦ Artifact
'Abuse Risks are Often Inherent to Product Features': Exploring AI Vendors’ Bug Bounty and Responsible Disclosure Policies Artifacts Available (v1.1) πŸ“¦ Artifact
A Distortion-minimization Watermarking Framework for Large Language Models: Larger Capacity, Stronger Robustness and Higher Quality Artifacts Available (v1.1) πŸ“¦ Artifact
A Large-Scale Study of Personalized Phishing using Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
A Midsummer Meme’s Dream: Investigating Market Manipulations in the Meme Coin Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
ARM MTE Performance in Practice Artifacts Available (v1.1) πŸ“¦ Artifact
Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding Artifacts Available (v1.1) πŸ“¦ Artifact
Analyzing the WebRTC Ecosystem and Breaking Authentication in DTLS-SRTP Artifacts Available (v1.1) πŸ“¦ Artifact
Anonymous Tokens with Designated-Reader Metadata Bit Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Arguzz: Testing zkVMs for Soundness and Completeness Bugs Artifacts Available (v1.1) πŸ“¦ Artifact
Artifacts for BLE Theft Auto: Evaluating the Security of Aftermarket BLE-based Automotive Remote Control Systems Artifacts Available (v1.1) πŸ“¦ Artifact
Assessing LLM Response Quality in the Context of Technology-Facilitated Abuse Artifacts Available (v1.1) πŸ“¦ Artifact
Attacks on Approximate Caches in Text-to-Image Diffusion Models Artifacts Available (v1.1) πŸ“¦ Artifact
Autonomy Comes with Costs: Detecting Denial-of-Service Vulnerabilities Caused by Resource Abusing in LLM-based Agents Artifacts Available (v1.1) πŸ“¦ Artifact
B-Privacy: Defining and Enforcing Privacy in Weighted Voting Artifacts Available (v1.1) πŸ“¦ Artifact
BADControl: Backdoor Attacks Against Control Systems Artifacts Available (v1.1) πŸ“¦ Artifact
BatchBoot: Fast Batched Bootstrapping for TFHE scheme and Practical Applications Artifacts Available (v1.1) πŸ“¦ Artifact
Behind Bars: A Side-Channel Attack on NVIDIA MIG Cache Partitioning Using Memory Barriers Artifacts Available (v1.1) πŸ“¦ Artifact
Bridges to Self: Silent Web-to-App Tracking on Mobile via Localhost Artifacts Available (v1.1) πŸ“¦ Artifact
Bridging Bitcoin to Second Layers via BitVM2 Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Can we estimate privacy vulnerability of individual records? Towards Mitigating Attribute Inference Attacks on ML Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Chameleon Channels: Measuring YouTube Accounts Repurposed for Deception and Profit Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
CombiSan: Unifying Software Sanitizers for Comprehensive Fuzzing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
CompLeak: Deep Learning Model Compression Exacerbates Privacy Leakage Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
Concretely efficient blind signatures based on VOLE-in-the-head proofs and the MAYO trapdoor Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Cracking Federated Privacy: Initialization-Resilient Gradient Inversion with Fine-Grained Reconstruction Artifacts Available (v1.1) πŸ“¦ Artifact
Cracks in the Walled Garden: Dissecting the Gray-Market of Unauthorized iOS App Distribution via Ad Hoc Sideloading Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
CuSafe: Capturing Memory Corruption on NVIDIA GPUs Artifacts Available (v1.1) πŸ“¦ Artifact
Cutting the Gordian Knot: Detecting Malicious PyPI Packages via a Knowledge-Mining Framework Artifacts Available (v1.1) πŸ“¦ Artifact
DDR-SSE: Duplicated Retrieval of Documents for System-wide Secure Searchable Symmetric Encryption Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
DMGuard: Safeguarding Kernels from Physical-Page Use-After-Free Vulnerabilities Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
DaLens: Charting DNS Self-Amplification Threats at Large Artifacts Available (v1.1) πŸ“¦ Artifact
Differential Trust: Dynamic Multi-Authority Anonymous Credentials with Epoch-Weighted Updates Artifacts Available (v1.1) πŸ“¦ Artifact
Digital Risks and Coping Practices among Roblox Game Creators Artifacts Available (v1.1) πŸ“¦ Artifact
Distributed Synthesis of Differentially Private Tabular Datasets Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Distributed Vector Commitments and Their Applications Artifacts Available (v1.1) πŸ“¦ Artifact
E2E-AKMA: An End-to-End Secure and Privacy-Enhancing AKMA Protocol Against the Anchor Function Compromise Artifacts Available (v1.1) πŸ“¦ Artifact
Efficient Threshold ML-DSA Artifacts Available (v1.1) πŸ“¦ Artifact
Efficient and High-Accuracy Secure Two-Party Protocols for a Class of Functions with Real-number Inputs Artifacts Available (v1.1) πŸ“¦ Artifact
End-to-End Encrypted Collaborative Documents Artifacts Available (v1.1) πŸ“¦ Artifact
Estimating the amount of script-generated traffic in a mixture Artifacts Available (v1.1) πŸ“¦ Artifact
FABRICKED: Misconfiguring Infinity Fabric to Break AMD SEV-SNP Artifacts Available (v1.1) πŸ“¦ Artifact
FABS: Fast Attribute-Based Signatures Artifacts Available (v1.1) πŸ“¦ Artifact
FIRA: Enabling Automatic Forensic Investigation of Unmanned Aerial Vehicles Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Fend for Yourself! Backdoor Purification in Federated Graph Learning with an Evolving Knowledge Anchor Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
FirmReBugger: A Benchmark Framework for Monolithic Firmware Fuzzers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
From Easy to Hard++: Promoting Differentially Private Image Synthesis Through Spatial-Frequency Curriculum Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
From Mirai to Gorilla: Deep Dive into a Long-Lasting DDoS-for-Hire Botnet Artifacts Available (v1.1) πŸ“¦ Artifact
From Texts to Rules: Generating Sigma Rules with Large Language Models from Cyber Threat Reports Artifacts Available (v1.1) πŸ“¦ Artifact
Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments Artifacts Available (v1.1) πŸ“¦ Artifact
HAMLOCK: HArdware-Model LOgically Combined attacK Artifacts Available (v1.1) πŸ“¦ Artifact
Heli: Heavy-Light Private Aggregation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Hop: A Modern Transport and Remote Access Protocol Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Hydrangea: Optimistic Two-Round Partial Synchrony with Improved Fault Resilience Artifacts Available (v1.1) πŸ“¦ Artifact
Identifying Provenance of Generative Text-to-Image Models Artifacts Available (v1.1) πŸ“¦ Artifact
Imitative Membership Inference Attack Artifacts Available (v1.1) πŸ“¦ Artifact
Inconsistent, Incomplete, and Insecure: A Survey of Account Security Interfaces Artifacts Available (v1.1) πŸ“¦ Artifact
Inference Attacks Against Graph Generative Diffusion Models Artifacts Available (v1.1) πŸ“¦ Artifact
InstantOMR: Oblivious Message Retrieval with Low Latency and Optimal Parallelizability Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
InstrSem: Automatically and Generically Inferring Semantics of (Undocumented) CPU Instructions Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Interpolation-Based Optimization for Enforcing lp-Norm Metric Differential Privacy in Continuous and Fine-Grained Domains Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Invariant-Guided Logical Testing of Open RAN Controllers Artifacts Available (v1.1) πŸ“¦ Artifact
IoT Product Page Data Artifacts Available (v1.1) πŸ“¦ Artifact
JailbreakScope: Interpreting Jailbreak Mechanism through Representation and Circuit Analyses Artifacts Available (v1.1) πŸ“¦ Artifact
Jailbreaking the AMD Secure Processor: Enabling Live Analysis of SEV-SNPs Undocumented Security Boundaries Artifacts Available (v1.1) πŸ“¦ Artifact
KernelRCA: Facilitating Root Cause Analysis of Memory Corruptions in Linux Kernel with Contextual Causality Chain Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Khost: KVM-based Near Native MCU Firmware Rehosting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
LPG: Raise Your Location Privacy Game in Direct-to-Cell LEO Satellite Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
Lethe: Purifying Backdoored Large Language Models with Knowledge Dilution Artifacts Available (v1.1) πŸ“¦ Artifact
Leveraging Cryptographic Simulator Synthesis for Formally Verifying the FOO E-Voting Protocol -- Artifacts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Libra: Pattern-Scheduling Co-Optimization for Cross-Scheme FHE Code Generation over GPGPU Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Logos: Robust Sharding Blockchain With Fast Processing and Optimal Cross-Shard Overhead Artifacts Available (v1.1) πŸ“¦ Artifact
Lost in Blockchain Address Misuse: Hidden Cross-Platform Risks and Their Security Impact Artifacts Available (v1.1) πŸ“¦ Artifact
Love, Lies, and Language Models: Investigating AI’s Role in Romance-Baiting Scams Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
M-Step: A Single-Stepping Framework for Side-Channel Analysis on TrustZone-M Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
MASLeak: Investigating and Exposing Intellectual Property Leakage Vulnerabilities in Multi-Agent Systems Artifacts Available (v1.1)
MULCOTAINT: Towards Efficient Multi-tag Dynamic Taint Analysis via Hardware/Software Co-design Artifacts Available (v1.1) πŸ“¦ Artifact
Membership Inference Attacks on Tokenizers of Large Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Memclave: Secure In-Memory Enclave for Untrusted Hosts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
NOIR: Privacy-Preserving Generation of Code with Open-Source LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
Network-Level Prompt and Trait Leakage in Local Research Agents Artifacts Available (v1.1) πŸ“¦ Artifact
Nudge: A Private Recommendations Engine Artifacts Available (v1.1) πŸ“¦ Artifact
OS-Sanitizer: System-wide Latent Defect Inference in Linux Applications Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
On Evaluating the Robustness of Large Vision-Language Models via Untargeted Modality Alignment Breaking Adversarial Attack Artifacts Available (v1.1) πŸ“¦ Artifact
Opossum Attack: Application Layer Desynchronization using Opportunistic TLS Artifacts Available (v1.1) πŸ“¦ Artifact
Overcoming the Retrieval Barrier: Indirect Prompt Injection in the Wild for LLM Systems Artifacts Available (v1.1) πŸ“¦ Artifact
PANGOLIN: Fuzzing Multilingual IoT Firmware with LLM-Driven Code Analysis Artifacts Available (v1.1) πŸ“¦ Artifact
PICS: Private Intersection over Committed (and reusable) Sets Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
PROBE+DETECT+MITIGATE (PDM): Enabling Cloud Tenants to Self-Defend against Microarchitectural Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
Patch-Guided Vulnerability Detection: Extracting Java API Security Rules via Attack–Defense Cross-Analysis Artifacts Available (v1.1) πŸ“¦ Artifact
PrivacyShield: Relaying BLE Beacons to Counter Unsolicited Tracking Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Provable Secure Steganography Based on Adaptive Dynamic Sampling Artifacts Available (v1.1) πŸ“¦ Artifact
Quantifying Large Language Model Attacks Through the Lens of Model Cognition Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Quorus: Efficient, Scalable Threshold ML-DSA Signatures from MPC Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping Artifacts Available (v1.1) πŸ“¦ Artifact
Residual-PAC Privacy: Automatic Privacy Control Beyond the Gaussian Barrier Artifacts Available (v1.1) πŸ“¦ Artifact
Revealing the Dark Side of Smart Accounts: An Empirical Study of EIP-7702 Incurred Risks in Blockchain Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
SMASH: Scalable Maliciously Secure Hybrid Multi-party Computation Framework for Privacy-Preserving Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
SafeFFI: Efficient Sanitization at the Boundary Between Safe and Unsafe Code in Rust and Mixed-Language Applications Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Scribe: Low-memory SNARKs via Read-Write Streaming Artifacts Available (v1.1) πŸ“¦ Artifact
Secure Protocol Composition under Dynamic Corruption: Models and Proofs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Security and Privacy Analysis of Tile’s Location Tracking Protocol Artifacts Available (v1.1) πŸ“¦ Artifact
Semantics Over Syntax: Uncovering Pre-Authentication 5G Baseband Vulnerabilities Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Shadowfax: Hybrid Security and Deniability for AKEMs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Shred-to-Shine Metamorphosis of (Distributed) Polynomial Commitments Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Side-Channel Attacks on Open vSwitch Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Silicon Heist: (Ransom) Attacks for Cloud FPGAs via Privilege Escalation Artifacts Available (v1.1) πŸ“¦ Artifact
Sirens Whisper: Inaudible Near-Ultrasonic Jailbreaks of Speech-Driven LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
Sliding into the Flight Deck’s DMs: Practical Message Attacks on CPDLC Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: PHILTER: Uncovering Security and Functional Gaps in AI-based Phishing Website Detection Literature via an LLM-based Reasoning Framework Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Security of Cyber-physical Systems Under Intentional Electromagnetic Interference Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Source Code: Assumption-Free Fuzzy PSI via Predicate Encryption Artifacts Available (v1.1) πŸ“¦ Artifact
Static Detection of TOCTOU Bugs Caused by Kernel Races Artifacts Available (v1.1) πŸ“¦ Artifact
Streaming Function Secret Sharing and Its Applications Artifacts Available (v1.1) πŸ“¦ Artifact
Sy-FAR: Symmetry-based Fair Adversarial Robustness Artifacts Available (v1.1) πŸ“¦ Artifact
TAT: Attesting Trajectory Integrity of Industrial Robotic Arms Artifacts Available (v1.1) πŸ“¦ Artifact
TIMESLICE-SANDWICH: A GPU Side-Channel Attack Exploiting Time-Sliced Scheduling Artifacts Available (v1.1) πŸ“¦ Artifact
The Adverse Effects of Omitting Records in Differential Privacy: How Sampling and Suppression Degrade the Privacy–Utility Tradeoff (USENIX Security 2026 Artifact) Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
The Art of Hide and Seek: Making Pickle-Based Model Supply Chain Poisoning Stealthy Again Artifacts Available (v1.1) πŸ“¦ Artifact
The Prompt Stealing Fallacy: Rethinking Metrics, Attacks, and Defenses Artifacts Available (v1.1) πŸ“¦ Artifact
The State of Passkeys: Studying the Adoption and Security of Passkeys on the Web Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TopFeaRe: Locating Critical State of Adversarial Resilience for Graphs Regarding Topology-Feature Entanglement Artifacts Available (v1.1) πŸ“¦ Artifact
Tracegram: Framing Trace-Level Traffic Analysis with Temporally-Aware Multiple Instance Learning Artifacts Available (v1.1) πŸ“¦ Artifact
Transparent Dictionaries from Polynomial Commitments Artifacts Available (v1.1) πŸ“¦ Artifact
TrojPix: Electromagnetic Covert Channels via Imperceptible Pixel Modulation Artifacts Available (v1.1) πŸ“¦ Artifact
Trustworthy and Confidential SBOM Exchange Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
Turn Your Face Into An Attack Surface: Screen Attack Using Facial Reflections in Video Conferencing Artifacts Available (v1.1) πŸ“¦ Artifact
Unbalanced Fuzzy Private Set Intersection for $L_{\infty}$ Distance: Achieving Sublinear Communication with Large Set Size Artifacts Available (v1.1) πŸ“¦ Artifact
United We Defend: Collaborative Membership Inference Defenses in Federated Learning Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Unlocking the True Potential of Decryption Failure Oracles: A Hybrid Adaptive-LDPC Attack on ML-KEM Using Imperfect Oracles Artifacts Available (v1.1) πŸ“¦ Artifact
VSG-Safe: Spotting NSFW Video through Cross-Frame Evidence Artifacts Available (v1.1) πŸ“¦ Artifact
VeCT: Secure and Efficient Constant-Time Code Rewriting with Vector Extensions Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ViPer Strike: Defeating Visual Reasoning CAPTCHAs via Structured Vision–Language Inference Artifacts Available (v1.1) πŸ“¦ Artifact
VidLeaks: Membership Inference Attacks Against Text-to-Video Models Artifacts Available (v1.1) πŸ“¦ Artifact
VΞ΅rity: Verifiable Local Differential Privacy Artifacts Available (v1.1) πŸ“¦ Artifact
WAVED: Principled Identification of Off-Path Exploitable Weak Verifications within the TCP/IP Protocol Suite Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
WILD Attack: Stealthy Undermining of Wi-Fi-Based Geolocation Through Remote Crowdsourced Data Injection Artifacts Available (v1.1) πŸ“¦ Artifact
When Fun Turns Toxic: A First Look at Aggressive Advertising in Mini-games Artifacts Available (v1.1) πŸ“¦ Artifact
When Updates Backfire: A Black-Box Security Analysis of Desktop Software Update Mechanisms Artifacts Available (v1.1) πŸ“¦ Artifact
Why Johnny Adopts Identity-Based Software Signing: A Usability Case Study of Sigstore Artifacts Available (v1.1) πŸ“¦ Artifact
Window-based Membership Inference Attacks Against Fine-tuned Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
XGuardian: Towards Explainable and Generalized AI Anti-Cheat on FPS Games Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
You Know Why, but Still Rely: The Impact of Explainable AI on Trust, Task Load, and Performance in Cybersecurity Decision-Making Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2, 3, 4
ZipPIR: High-throughput Single-server PIR without Client-side Storage Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
kSFS: Repurposing a Microkernel-like Interface for Fast and Secure In-Kernel Linux File Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
mmCipher: Batching Post-Quantum Public Key Encryption Made Bandwidth-Optimal Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
vCause: Efficient and Verifiable Causality Analysis for Cloud-based Endpoint Auditing Artifacts Available (v1.1) πŸ“¦ Artifact